New & Notable
IPv6 security and network protocols security News
June 09, 2020
A new vulnerability in the Universal Plug and Play protocol could be used to exfiltrate enterprise data and launch DDoS attacks, and patches may not arrive for a long time.
February 05, 2020
Armis Security disclosed five vulnerabilities, dubbed 'CDPwn,' in Cisco's Discovery Protocol, which impact 'tens of millions' of Cisco devices such as routers and IP phones.
May 06, 2019
Cisco released a patch for a critical vulnerability in Nexus 9000 switches that could allow a remote attacker to gain root access because of the use of a default SSH key pair.
January 03, 2018
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the long wait for TLS 1.3 and the effects -- positive and negative -- the delays have had for enterprise security.
IPv6 security and network protocols security Get Started
Bring yourself up to speed with our introductory content
The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. Continue Reading
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Continue Reading
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
Evaluate IPv6 security and network protocols security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
These six key factors will help your company determine the best NGFW product for your organization's needs. Continue Reading
Compare leading next-generation firewalls to help find the option that best fits your IT environment and security needs. Continue Reading
Learn the advantages of next-generation firewalls that protect enterprise networks from attacks and intrusion, as well as the differences between NGFWs and traditional firewalls. Continue Reading
Manage IPv6 security and network protocols security
Learn to apply best practices and optimize your operations.
Protecting the enterprise network remains integral to overall IT security. Here are the top network security techniques enterprises are using to protect data. Continue Reading
The lack of security protections in BGP means that route hijacking can be easy, especially for organized crime or state-backed threat actors. Here are ways to deal with it. Continue Reading
What is DNS Flag Day? That's when old and broken DNS servers will stop working, improving DNS performance and safety for all. Infoblox's chief DNS architect Cricket Liu explains. Continue Reading
Problem Solve IPv6 security and network protocols security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Organizations can get wrapped up in the excitement of IoT technology and forget that older tech, including DNS, might not be up to supporting and securing new and old technology. Continue Reading
Learn two techniques for improving end-user DNS privacy protection that prevent DNS from exposing information about websites users visit and the people users communicate with. Continue Reading
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend against such attacks. Continue Reading